* ktest.c, ktest_equal.c, ktest_equal.h :
authorChris Provenzano <proven@mit.edu>
Wed, 6 Sep 1995 19:19:54 +0000 (19:19 +0000)
committerChris Provenzano <proven@mit.edu>
Wed, 6 Sep 1995 19:19:54 +0000 (19:19 +0000)
s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6729 dc483132-0cff-0310-8789-dd5450dbe970

src/tests/asn.1/ChangeLog
src/tests/asn.1/ktest.c
src/tests/asn.1/ktest_equal.c
src/tests/asn.1/ktest_equal.h

index 4333a05d51b79996edfda3feaf582304e9d4c1c6..606f5ab63016f6c1c99b5631ec3cd1713584f3d2 100644 (file)
@@ -1,3 +1,8 @@
+Wed Sep 06 14:20:57 1995   Chris Provenzano (proven@mit.edu)
+
+        * ktest.c, ktest_equal.c, ktest_equal.h : 
+               s/keytype/enctype/g, s/KEYTYPE/ENCTYPE/g
+
 Tue Sep 05 22:10:34 1995   Chris Provenzano (proven@mit.edu)
 
         * ktest.c, ktest.h, ktest_equal.c, ktest_equal.h : Remove krb5_enctype 
index 27956cfc7a9ce2cea83db146da4f48ec56c0612c..146625bba20fbbc4effe3d19fb8c7d532902057a 100644 (file)
@@ -65,7 +65,7 @@ krb5_error_code ktest_make_sample_keyblock(kb)
      krb5_keyblock * kb;
 {
   kb->magic = KV5M_KEYBLOCK;
-  kb->keytype = 1;
+  kb->enctype = 1;
   kb->length = 8;
   kb->contents = (krb5_octet*)calloc(8,sizeof(krb5_octet));
   if(kb->contents == NULL) return ENOMEM;
@@ -93,7 +93,7 @@ krb5_error_code ktest_make_sample_enc_data(ed)
   krb5_error_code retval;
 
   ed->kvno = 5;
-  ed->keytype = 0;
+  ed->enctype = 0;
   retval = krb5_data_parse(&(ed->ciphertext),"krbASN.1 test message");
   if(retval) return retval;
 
@@ -375,7 +375,7 @@ krb5_error_code ktest_make_sample_kdc_req(kr)
   kr->rtime = SAMPLE_TIME;
   kr->nonce = SAMPLE_NONCE;
   kr->nktypes = 2;
-  kr->ktype = (krb5_keytype*)calloc(2,sizeof(krb5_keytype));
+  kr->ktype = (krb5_enctype*)calloc(2,sizeof(krb5_enctype));
   kr->ktype[0] = 0;
   kr->ktype[1] = 1;
   retval = ktest_make_sample_addresses(&(kr->addresses));
@@ -404,7 +404,7 @@ krb5_error_code ktest_make_sample_kdc_req_body(krb)
   krb->rtime = SAMPLE_TIME;
   krb->nonce = SAMPLE_NONCE;
   krb->nktypes = 2;
-  krb->ktype = (krb5_keytype*)calloc(2,sizeof(krb5_keytype));
+  krb->ktype = (krb5_enctype*)calloc(2,sizeof(krb5_enctype));
   krb->ktype[0] = 0;
   krb->ktype[1] = 1;
   retval = ktest_make_sample_addresses(&(krb->addresses));
@@ -832,8 +832,8 @@ void ktest_destroy_sequence_of_integer(soi)
   *soi = NULL;
 }
 
-void ktest_destroy_sequence_of_keytype(soi)
-     krb5_keytype ** soi;
+void ktest_destroy_sequence_of_enctype(soi)
+     krb5_enctype ** soi;
 {
   free(*soi);
   *soi = NULL;
index 8d9ff108dc53e46846964f714d94b5d5e7535b2b..25e139f1acdc9601ccd6bab6a1b47f8f2f6f0823 100644 (file)
@@ -71,7 +71,7 @@ int ktest_equal_keyblock(ref, var)
 {
   if(ref==var) return TRUE;
   else if(ref == NULL || var == NULL) return FALSE;
-  return(scalar_equal(keytype) && len_equal(length,contents,ktest_equal_array_of_octet));
+  return(scalar_equal(enctype) && len_equal(length,contents,ktest_equal_array_of_octet));
 }
 
 int ktest_equal_data(ref, var)
@@ -103,7 +103,7 @@ int ktest_equal_enc_data(ref, var)
   int p=TRUE;
   if(ref==var) return TRUE;
   else if(ref == NULL || var == NULL) return FALSE;
-  p=p&&scalar_equal(keytype);
+  p=p&&scalar_equal(enctype);
   p=p&&scalar_equal(kvno);
   p=p&&struct_equal(ciphertext,ktest_equal_data);
   return p;
@@ -116,7 +116,7 @@ int ktest_equal_encryption_key(ref, var)
   int p=TRUE;
   if(ref==var) return TRUE;
   else if(ref == NULL || var == NULL) return FALSE;
-  p = p && scalar_equal(keytype);
+  p = p && scalar_equal(enctype);
   p = p && len_equal(length,contents,ktest_equal_array_of_octet);
   return p;
 }
@@ -363,7 +363,7 @@ int ktest_equal_as_req(ref, var)
   p=p&&scalar_equal(till);
   p=p&&scalar_equal(rtime);
   p=p&&scalar_equal(nonce);
-  p=p&&len_equal(nktypes,ktype,ktest_equal_array_of_keytype);
+  p=p&&len_equal(nktypes,ktype,ktest_equal_array_of_enctype);
   p=p&&ptr_equal(addresses,ktest_equal_addresses);
   p=p&&struct_equal(authorization_data,ktest_equal_enc_data);
 /* This field isn't actually in the ASN.1 encoding. */
@@ -392,7 +392,7 @@ int ktest_equal_kdc_req_body(ref, var)
   p=p&&scalar_equal(till);
   p=p&&scalar_equal(rtime);
   p=p&&scalar_equal(nonce);
-  p=p&&len_equal(nktypes,ktype,ktest_equal_array_of_keytype);
+  p=p&&len_equal(nktypes,ktype,ktest_equal_array_of_enctype);
   p=p&&ptr_equal(addresses,ktest_equal_addresses);
   p=p&&struct_equal(authorization_data,ktest_equal_enc_data);
   /* This isn't part of the ASN.1 encoding. */
@@ -536,10 +536,10 @@ int ktest_equal_array_of_char(length, ref, var)
   return p;
 }
 
-int ktest_equal_array_of_keytype(length, ref, var)
+int ktest_equal_array_of_enctype(length, ref, var)
      const int length;
-     krb5_keytype * ref;
-     krb5_keytype * var;
+     krb5_enctype * ref;
+     krb5_enctype * var;
 {
   int i, p=TRUE;
 
index 43e1ab3372dc3b33d63d02b0d6871ee6d47eb66e..375cc546df896abefcdceea9ca5d46dfe04fb943 100644 (file)
@@ -63,7 +63,7 @@ int ktest_equal_sequence_of_pa_data
 int ktest_equal_sequence_of_cred_info
        KRB5_PROTOTYPE((krb5_cred_info **ref, krb5_cred_info **var));
 
-len_array(ktest_equal_array_of_keytype,krb5_keytype);
+len_array(ktest_equal_array_of_enctype,krb5_enctype);
 len_array(ktest_equal_array_of_data,krb5_data);
 len_array(ktest_equal_array_of_octet,krb5_octet);